Sankar et al., 2023 - Google Patents
Spoofing detection for personal voice assistantsSankar et al., 2023
View PDF- Document ID
- 5561777755684230921
- Author
- Sankar M
- De Leon P
- Roedig U
- Publication year
External Links
Snippet
Abstract Personal Voice Assistants (PVAs) are common acoustic sensing systems that are used as a speech-based controller for critical systems making them vulnerable to speech spoofing attacks. Prior research has focused on the discrimination of genuine and spoofed …
Classifications
-
- G—PHYSICS
- G10—MUSICAL INSTRUMENTS; ACOUSTICS
- G10L—SPEECH ANALYSIS OR SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING; SPEECH OR AUDIO CODING OR DECODING
- G10L15/00—Speech recognition
- G10L15/06—Creation of reference templates; Training of speech recognition systems, e.g. adaptation to the characteristics of the speaker's voice
- G10L15/065—Adaptation
- G10L15/07—Adaptation to the speaker
-
- G—PHYSICS
- G10—MUSICAL INSTRUMENTS; ACOUSTICS
- G10L—SPEECH ANALYSIS OR SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING; SPEECH OR AUDIO CODING OR DECODING
- G10L17/00—Speaker identification or verification
- G10L17/06—Decision making techniques; Pattern matching strategies
- G10L17/10—Multimodal systems, i.e. based on the integration of multiple recognition engines or fusion of expert systems
-
- G—PHYSICS
- G10—MUSICAL INSTRUMENTS; ACOUSTICS
- G10L—SPEECH ANALYSIS OR SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING; SPEECH OR AUDIO CODING OR DECODING
- G10L15/00—Speech recognition
- G10L15/08—Speech classification or search
- G10L2015/088—Word spotting
-
- G—PHYSICS
- G10—MUSICAL INSTRUMENTS; ACOUSTICS
- G10L—SPEECH ANALYSIS OR SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING; SPEECH OR AUDIO CODING OR DECODING
- G10L17/00—Speaker identification or verification
- G10L17/04—Training, enrolment or model building
-
- G—PHYSICS
- G10—MUSICAL INSTRUMENTS; ACOUSTICS
- G10L—SPEECH ANALYSIS OR SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING; SPEECH OR AUDIO CODING OR DECODING
- G10L17/00—Speaker identification or verification
- G10L17/005—Speaker recognisers specially adapted for particular applications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/316—User authentication by observing the pattern of computer usage, e.g. typical user behaviour
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Chen et al. | Who is real bob? adversarial attacks on speaker recognition systems | |
Sahidullah et al. | Introduction to voice presentation attack detection and recent advances | |
Boles et al. | Voice biometrics: Deep learning-based voiceprint authentication system | |
Liu et al. | An MFCC‐based text‐independent speaker identification system for access control | |
Balamurali et al. | Toward robust audio spoofing detection: A detailed comparison of traditional and learned features | |
Han et al. | Voice-indistinguishability: Protecting voiceprint in privacy-preserving speech data release | |
Malik et al. | A light-weight replay detection framework for voice controlled IoT devices | |
Das et al. | Long Range Acoustic Features for Spoofed Speech Detection. | |
Chen et al. | Towards understanding and mitigating audio adversarial examples for speaker recognition | |
Tan et al. | A survey on presentation attack detection for automatic speaker verification systems: State-of-the-art, taxonomy, issues and future direction | |
Arif et al. | Voice spoofing countermeasure for logical access attacks detection | |
Dua et al. | A hybrid noise robust model for multireplay attack detection in Automatic speaker verification systems | |
Weng et al. | The sysu system for the interspeech 2015 automatic speaker verification spoofing and countermeasures challenge | |
Zhou et al. | Voice spoofing countermeasure for voice replay attacks using deep learning | |
Zhang et al. | Volere: Leakage resilient user authentication based on personal voice challenges | |
Sharma | Speaker recognition using machine learning techniques | |
Khan et al. | SpoTNet: A spoofing-aware Transformer Network for Effective Synthetic Speech Detection | |
Ouyang et al. | Capsule network based end-to-end system for detection of replay attacks | |
Kuznetsov et al. | Methods of countering speech synthesis attacks on voice biometric systems in banking | |
Nasersharif et al. | Evolutionary fusion of classifiers trained on linear prediction based features for replay attack detection | |
Qadir et al. | Voice spoofing countermeasure based on spectral features to detect synthetic attacks through LSTM | |
CN116665649A (en) | Synthetic voice detection method based on prosody characteristics | |
Park et al. | User authentication method via speaker recognition and speech synthesis detection | |
Chaiwongyen et al. | Contribution of timbre and shimmer features to deepfake speech detection | |
Sankar et al. | Spoofing detection for personal voice assistants |